The Security Role - Audit Report enables organizations to monitor changes made to security roles. Organizations can retrieve information related to which users have been assigned to which security roles and the security role modification history. This report includes changes to the security role name, the parent security role, the security role type, active status, the permissions included in the security role, and users assigned to or removed from the security role.
This report supports 100,000 rows of data.
To access the Security Role - Audit Report, go to Reports > Standard Reports. From the System tab, select thelink.
|PERMISSION NAME||PERMISSION DESCRIPTION||CATEGORY|
|Security Administration - General Constraints||Grants access to apply general constraints to permissions when creating/editing a security role. This permission works in conjunction with the Security Administration - Manager permission. This is an administrator permission.||Core Administration|
|Security Role - Audit Report||Grants access to the Security Role - Audit Report, which enables organizations to report on which users have been assigned to which security roles and the security role modification history. This permission cannot be constrained.||Reports - System|
The following report filters are available:
|Action Date||Select a date range for the report. The report will return any modification history for the selected date range. The default value is Last Month. This is a required field. Date values are set in the time zone of the user running the report.|
Select one security roles to include in the report. The report will return any modification history related to the selected security role.
The Security Role filter is visible to all users. However, a Restricted Access error message is displayed if an administrator attempts to use the filter or process the report if they do not have the Security Administration - Manage permission. Further, administrators can only view security roles that are within their Security Administration - Manage and Security Administration - General Constraints permissions.
|Role Status||Select this option to include inactive security roles in the report output.|
The following details are included in the report output: